The Onapsis Security Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Jason Fruge

Vice President of Business Application Cybersecurity

With over 20 years of information security and IT leadership experience, Jason leads the company’s Global Professional Services team, a critical part of Onapsis’s customer success efforts. Previously, as CISO at Fossil Group, he was responsible for providing leadership and information security advice, governance and subject-matter expertise to the company’s executive leadership and global team of technical staff who manage critical distributed information systems. Prior to Fossil Group, Jason held various executive positions in global information security at Signet Jewelers, Citi and Cerner Corporation.
 

Thumbnail
Wednesday Whisper: How to Become Cyber Resilient | Part 2

Wednesday Whisper: How to Become Cyber Resilient | Part 2

Part one of this series discussed how to survive a cyberattack by planning effectively and being fully prepared before putting a plan into action. Now, I want to delve deeper into the topic by examining what I call a “risk-based response” to an attack against your organization’s business-critical applications, including your ERP systems.
Thumbnail
Wednesday Whisper: How to Become Cyber Resilient

Wednesday Whisper: How to Become Cyber Resilient

Effective planning for a cyberattack requires participation from many different departments in an organization. It’s not enough for the security and IT teams to have an incident response (IR) plan ready should a security incident occur. While they are experts when it comes to technology, successful preparation for a cyberattack involves much more than just what to do with computers and related equipment.

Request a
Business Risk Illustration

Examine the operational risk and cybersecurity posture of your business-critical applications to determine the potential impact of sub-optimal application performance, unplanned downtime and an attack on your organization’s ERP platforms.

Engage